Sciweavers

2144 search results - page 191 / 429
» Understanding Document Analysis and Understanding (through M...
Sort
View
CCS
2007
ACM
15 years 11 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
BMCBI
2005
132views more  BMCBI 2005»
15 years 5 months ago
CLPM: A Cross-Linked Peptide Mapping Algorithm for Mass Spectrometric Analysis
Background: Protein-protein, protein-DNA and protein-RNA interactions are of central importance in biological systems. Quadrapole Time-of-flight (Q-TOF) mass spectrometry is a sen...
Yong Tang, Yingfeng Chen, Cheryl F. Lichti, Roger ...
ICC
2007
IEEE
135views Communications» more  ICC 2007»
15 years 11 months ago
New Results on Single-Step Power Control System in Finite State Markov Channel: Power Control Error Modelling and Queueing Varia
— The analysis regarding the impact of the single-step power control (SSPC) scheme on the system performance such as bit error rate, packet error rate and queueing variation is h...
Shi-Yong Lee, Min-Kuan Chang
IFIP13
2004
15 years 6 months ago
Toward A Human-Centered UML For Risk Analysis
: Safety is now a major concern in many complex systems such as medical robots. A way to control the complexity of such systems is to manage risk. The first and important step of t...
Jérémie Guiochet, Gilles Motet, Clau...
DAC
2007
ACM
16 years 6 months ago
Global Critical Path: A Tool for System-Level Timing Analysis
An effective method for focusing optimization effort on the most important parts of a design is to examine those elements on the critical path. Traditionally, the critical path is...
Girish Venkataramani, Mihai Budiu, Tiberiu Chelcea...